• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

War Room

Shells From Above

RSM logo

  • Home
  • About
  • Blog
  • Talks/Whitepapers
  • Tools
  • Recreation

Blog

Organizing the Bad News – Auditing Passwords with Python

November 20, 2015 By RSM Author

From time to time we find ourselves conducting a password audit for a client.  While not terribly exciting from an attackers point of view, it is a necessary check to perform and can provide valuable output if the client is capable of acting on it.  Many organizations also perform similar assessments internally.  Typically the process looks something like this: 1. Obtain ... READ MORE

Bypassing Common Physical Security Perimeter Controls

November 18, 2015 By Ken Smith

http://www.pennmedicine.org/perelman/images/renderings/lobby_desk.jpg

On a recent physical penetration test, I encountered a curious, but not uncommon, scenario. The target organization sat spread across multiple, disconnected floors in a shared, third party-owned high rise.  The large first floor lobby was a public space and included a central guard desk (which really only functioned as an information kiosk). The target did include a reception ... READ MORE

Phishing for Days: Utilizing the King Phisher Calendar Invite

November 17, 2015 By Jeremy

templates

With the upcoming release of King Phisher v1.1, there will come a new way to Phish through calendar invites. "Why calendar invites?" you might ask. Well, when you get a typical calendar invite, how likely are you to thoroughly read through it? People tend to check the sender and, maybe, their availability and then accept. Only when it's time for the meeting do most ... READ MORE

Ghosts in the Machines

October 30, 2015 By RSM Author

Methods for the prevention, detection, and removal of ghosts in digital networks We often find that clients are so focused on preventing attacks from malicious living humans that they completely neglect the threat posed by ghosts. With that in mind, today’s post focuses on defensive measures that can be implemented to (1) prevent ghost infestations; (2) detect paranormal ... READ MORE

Launch rdesktop from Metasploit

October 26, 2015 By RSM Author

I often resort to remote desktop sessions when pillaging or attempting lateral escalation.  Remote desktop provides an easy way to look for important data, get an idea of what applications are in use, run scripts or programs, and transfer data between my host and the target system.  Since the Windows “Remote Desktop Connection” program keeps track of IP addresses and makes it ... READ MORE

Let’s Build an Arcade Cabinet: Episode I

October 19, 2015 By Ken Smith

So this is not a security-related post, but what the heck. Every quarter or so here at RSM, we hold an Innovation Day. We get to dedicate a full day's worth of time to personal projects that will benefit the company in some way. We've had some really cool projects come out of the Innovation Days of the past which have included the WMD (a Pi-based device for tracking down ... READ MORE

King Phisher 1.0 Released

October 16, 2015 By Spencer

Since it's inception almost two years ago King Phisher has changed the way we at RSM provide email based social engineering services to our clients. We have integrated it into our external penetration testing methodology as well as relied on it for dedicated social engineering assessments. At the time, other phishing projects did not have the flexibility to meet all of the ... READ MORE

Metasploit Module of the Month – enum_ad_computers

September 25, 2015 By RSM Author

Summer has officially ended and Autumn is setting in. As the leaves begin to fall and September draws to a close, it’s a perfect time to sit back and reflect on the metasploit modules that filled our Summer months with joy. In the third installment of our “Module of the Month” series we examine enum_ad_computers, a post-exploitation module that combines the flexibility of LDAP ... READ MORE

Crontab One Time Payload Execution

September 21, 2015 By Spencer

Recently, I was writing an exploit for a vulnerability that I had discovered in a Linux based server application. The flaw, when successfully exploited, allowed a file to be written anywhere on the file system with the permissions of the user running the server. In the case of the application I was targeting, it was often executed as root in order to bind to a privileged port ... READ MORE

Accessing Internal Web Apps via Meterpreter on a Jumpbox

September 15, 2015 By Ken Smith

Post breach on a recent external penetration test, I wanted to do some poking around the target's intranet which required that I set up a SOCKS proxy. Given that I was using a jumpbox, I knew it was going to be necessary to set up a tunnel to get everything working properly. If you're anything like me, tunneling makes your brain hurt. Fortunately, with a little help from jagar, ... READ MORE

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 18
  • Page 19
  • Page 20
  • Page 21
  • Page 22
  • Interim pages omitted …
  • Page 27
  • Go to Next Page »

Primary Sidebar

Categories

  • Defense
  • Forensics
  • Offense
  • Physical
  • R&D

Most Viewed Posts

  • DLL Injection Part 1: SetWindowsHookEx 11.1k views
  • Sophos UTM Home Edition – 3 – The Setup 10.9k views
  • Leveraging MS16-032 with PowerShell Empire 10.1k views
  • Bypassing Gmail’s Malicious Macro Signatures 10k views
  • How to Bypass SEP with Admin Access 9.1k views

Footer

  • Facebook
  • LinkedIn
  • Twitter
  • Tools
  • About
  • RSM US LLP

(312) 634-3400

30 S. Wacker Drive Suite 3300
Chicago, IL 60606

Copyright © 2026 RSM US LLP. All rights reserved. RSM US LLP is a limited liability partnership and the U.S. member firm of RSM International, a global network of independent audit, tax and consulting firms. The member firms of RSM International collaborate to provide services to global clients, but are separate and distinct legal entities that cannot obligate each other. Each member firm is responsible only for its own acts and omissions, and not those of any other party. Visit for more information regarding RSM US LLP and RSM International.